General

  • Target

    2024-05-22_bf32330ab708d4c4095a1ac6478c05d6_virlock

  • Size

    787KB

  • Sample

    240522-w14sgabh82

  • MD5

    bf32330ab708d4c4095a1ac6478c05d6

  • SHA1

    85dc46cefb2d4ce1041e1e291085e182f5322db1

  • SHA256

    1dc30b96bd17080d462aa1609f5d1f68bcb00c1a7d7e375861b4acab70203b86

  • SHA512

    f559e841a39c9d6b21c32e346b0052263e549ff667bf62a6003e0cd51d90e6fe59c012f579ba6c9b47ad97466736201386fad30e3d9770ffcd8d9f53a83a855c

  • SSDEEP

    12288:3435j5d5K/82C/bXnry/s53i4nENWzgJ0U/ET/iAfCYnJV4ppzUBhhPkcW2kw:OZ7nSk3in6/iu5JCHgre0

Malware Config

Targets

    • Target

      2024-05-22_bf32330ab708d4c4095a1ac6478c05d6_virlock

    • Size

      787KB

    • MD5

      bf32330ab708d4c4095a1ac6478c05d6

    • SHA1

      85dc46cefb2d4ce1041e1e291085e182f5322db1

    • SHA256

      1dc30b96bd17080d462aa1609f5d1f68bcb00c1a7d7e375861b4acab70203b86

    • SHA512

      f559e841a39c9d6b21c32e346b0052263e549ff667bf62a6003e0cd51d90e6fe59c012f579ba6c9b47ad97466736201386fad30e3d9770ffcd8d9f53a83a855c

    • SSDEEP

      12288:3435j5d5K/82C/bXnry/s53i4nENWzgJ0U/ET/iAfCYnJV4ppzUBhhPkcW2kw:OZ7nSk3in6/iu5JCHgre0

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (60) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks